Senior Sap Architect, Security And Administration Resume
SUMMARY
- Business Objects, HANA 2.0, HANA Enterprise Cloud, SAP Cloud, MS Azure Cloud, SAP Fiori, GRC Access Control 10.1, SAP NW 7.5, Business Suite, BW, CRM, Identity Management, Portal, PO, Solution Manager, Federated BI Portal, Redwood CPS, NWDI, LVM
- Design and development of Business roles on Business Objects, HANA, Business Suite, ECC, BW, Solution Manager, Java stack, Active Directory Integration, GRC SoD, audit and FireFighter access, security audit logging and analysis
PROFESSIONAL EXPERIENCE
Confidential
Senior SAP Architect, Security and Administration
Responsibilities:
- Designed and implemented user profiles and authorizations for ECC systems using activity groups and roles, functional areas including Financial Accouting, Budget, Funds Management, Asset Management
- Implemented Structural authorizations in ECC using Organisation Management hierarchy and staff positions
- Designed and implemented user profiles and authorizations for BW4HANA systems using Analysis Authorizations to limit access to data as per security policies and privacy rules
- Used GRC Access Control for implementing Segregation of Duties (SOD) policies
- Extracted hierarchical and flat authorizations into BW4HANA from ECC and generated Analysis Authorization profiles for BW4HANA users through DSOs
- Designed and implemented user profiles and authorizations for SAP Fiori Gateway systems
- Implemented user profiles and authorizations for SAP Enterprise Portal systems
- Designed and implemented roles and authorizations for SAP Ariba implementation on SAP Cloud platform
- Implemented authorizations using principle of least privilege
- Designed and implemented user profiles and authorizations for Solution Manager to configure access for ChaRM, documentation, monitoring
- Used ChaRM for management and promotion of changes in the SAP systems, including ECC, Enterprise Portal, BW and Business Objects changes.
Confidential
Senior SAP Architect, Migration and Security
Responsibilities:
- Designed and implemented user profiles and authorizations for ECC systems and S/4 HANA systems using activity groups and roles, functional areas including Financial Accouting, Budget, Funds Management, Asset Management
- Implemented authorizations using principle of least privilege
- Carried out security configuration activities for upgrade of SAP ECC systems using the security transaction su25 and completed the steps
- Migrated roles and authorizations from ECC to S/4 HANA using brownfield strategy
- Carried out pre - upgrade steps in source ECC system, carried out post-upgrade steps in S/4 HANA system. Analyzed inactive objects from source system, changed roles to include new relevant objects in the target S/4 HANA system. Tested and validated new roles and authorizations in target system.
- Designed, configured and implemented roles and authorizations for new greenfield implementation of S/4 HANA, using principle of least privilege.
- Implemented the Segregation of Duties matrix
- Implemented Business and Technical roles using GRC Access Control
- Designed and implemented user profiles and authorizations for Solution Manager to configure access for ChaRM, documentation, monitoring
- Carried out security configuration for upgrade of SAP Solution Manager systems to 7.2 using su25
- Designed and implemented user profiles and authorizations for SAP Enterprise Portal
- Designed the authorization checks for limiting access to sensitive data. This was done by monitoring assignment of transactions to users that allowed access to sensitive data such as personal details of employees and personnel, salary information, medical records and other data deemed to be of sensitive nature or protected by privacy laws.
- The usage of such transactions by users was monitored by use of the security audit log and recorded for auditing purposes.
- Designed and configured roles and profiles to comply with Segregation of Duties policies. This was done by identification of transaction groups and accesses that would come under the SOD guidelines. The assignment of such transactions was monitored by regular reporting of assignments to users.
- Configured the Change Request Management (ChaRM) functionality on the Solution Manager system.
- Used ChaRM for management and promotion of changes in the SAP systems, including ECC, Enterprise Portal, BW and Business Objects changes.
- Determined and implemented user authorizations for system users to enable BI reporting from Business Objects, Crystal Reports Enterprise
- Implemented secure communication for HANA by configuration of Secure Sockets Layer on the HANA installation
- Implemented encrypted communication between the Netweaver Application server and the HANA platform
- Configured and implemented Secure Network Communication to enable secure SAP access for business users
- Configured and implemented Single Sign On using the SPNego protocol
- Determined and implemented user authorizations for system users to enable BI reporting from Business Objects, Crystal Reports Enterprise
- Carried out migration of the SAP Netweaver to HANA and Linux
- Migrated from on-premise hosting to Microsoft Azure Cloud
- Enable access from the local TBS network to the cloud using webgui
Confidential
Senior SAP Architect Development and Security
Responsibilities:
- Implemented security and access for the SAP BW landscape
- Designed and implemented user profiles and authorizations using activity groups and roles
- Analyzed the user access requirements for different classes of infoproviders
- Designed and implemented analysis authorizations based on user access profiles in conjunction with data owners
- Implemented BW for Integrated Planning, reporting and analytics.
- Carried out modeling for the planning requirements. Developed the real-time infoproviders
- Designed and developed aggregation levels for input of planning data and reporting
- Designed and developed filters for the aggregation levels to implement integrated planning as per business requirements
- Created characteristic relationships for ensuring data integrity
- Created data slices based on selection and exit classes for locking during planning
- Developed planning functions and planning sequences to be executed in manual or automated mode
- Developed Process Chains for extraction, transformation and loading of data including automated changes of status of real-time infoproviders used in planning
- Planned the BW system migration to BW4HANA. Implementation of SAP BW4HANA and S/4 HANA was identified as a requirement for business renovation strategy.
- Planning for interfacing of BW4HANA with S/4HANA, Operational Data Provisioning and Advanced DSO
- Analysed and modified infoproviders in order to meet changing data requirements.
- Implemented business rules for extraction and transformation of data that were planned to be loaded to the infoproviders
- Design of RDA (real time data acquisition) using Service API configuration.
- Query design and implementation using Query Designer, workbook configuration, web templates using Web Application Designer (WAD)
Confidential
Senior SAP Technical/Security Architect
Responsibilities:
- Designed and implemented user profiles and authorizations for ECC systems using activity groups and roles, functional areas including Financial Accouting, Budget, Funds Management, Asset Management
- Implemented authorizations using principle of least privilege
- Carried out security configuration activities for upgrade of SAP ECC systems using the security transaction su25 and completed the steps
- Ported roles and authorizations from ECC to S/4 HANA. Carried out pre-upgrade and post-upgrade steps to validate and test authorizations in target S/4 HANA system.
- Designed and implemented user profiles and authorizations for Solution Manager to configure access for ChaRM, documentation, monitoring
- Carried out security configuration for upgrade of SAP Solution Manager systems to 7.2 using su25
- Designed and implemented user profiles and authorizations for SAP Enterprise Portal
- Used GRC Access Control for implementing Segregation of Duties (SOD) policies
- Designed the authorization checks for limiting access to sensitive data. This was done by monitoring assignment of transactions to users that allowed access to sensitive data such as personal details of employees and personnel, salary information, medical records and other data deemed to be of sensitive nature or protected by privacy laws.
- The usage of such transactions by users was monitored by use of the security audit log and recorded for auditing purposes.
- Designed and configured roles and profiles to comply with Segregation of Duties policies. This was done by identification of transaction groups and accesses that would come under the SOD guidelines. The assignment of such transactions was monitored by regular reporting of assignments to users.
- Configured the Change Request Management (ChaRM) functionality on the Solution Manager system.
- Used ChaRM for management and promotion of changes in the SAP systems, including ECC, Enterprise Portal, BW and Business Objects changes.
- Architected, designed and configured the SAP ECC landscape for implementation of Fiori
- Designed and created Roles and Authorizations for the ECC landscape
- Architected, designed and implemented the SAP Fiori landscape with FES 4
- Upgraded SAPUI5 libraries
- Architected, designed and implemented Roles and Authorizations for the Fiori landscape
- Migrated BW from Oracle to HANA
- Designed and implemented Roles and Authorizations for the BW on HANA landscape
- Detailed documentation was maintained and distributed to the Confidential teams and personnel to enhance understanding.
- Additional information was provided whenever required and follow-up was done with the teams and individuals concerned to ensure that all issues were addressed and answered.
- Implemented security policies and access for the SAP Business Objects landscape
- Configured connectivity between the BW and Business Objects Systems
- Carried out import of roles from the backend BW systems on the Business Objects systems
- Used inheritance of authorizations to implement security on the Business Objects systems
- Created users on the SAP Business Objects systems using different authentication methods including Enterprise authentication and SAP authentication
- Provided security on SAP Business Objects including folder level security for sensitive reports
- Configure access levels for Business Objects users as per security guidelines
- Architected, designed and implemented the SAP Solution Manager 7.2 on HANA landscape
- Implemented SAP security on new Solution Manager 7.2 landscape on HANA
- Implemented HANA on HANA Enterprise Cloud (HEC)
- Implemented Security and Access policies for the new Solution Manager landscape
- Designed and implemented design time and runtime roles for the BW HANA landscape
- Designed and implemented roles and authorizations for Developers, Administrators, Power users, Business users, Functional users and Testers.
- Designed and implemented roles and authorizations for Developers, Administrators, Power users, Business users, Functional users and Testers.
- Created deployment plans, integration and testing plans acceptance plans for the project
- Guided the project team to follow SAP Best Practices
Confidential
Senior SAP Access Control and Compliance Architect
Responsibilities:
- Designed and implemented a new GRC landscape. Systems included the Development, Quality Assurance and Production systems.
- Designed and implemented roles and authorizations for Developers, Administrators, Power users, Business users, Functional users and Testers.
- Configured connectivity between the ECC and GRC systems.
- Designed Business roles and Technical roles using GRC functionality.
- Created deployment plans, integration and testing plans acceptance plans for the project
- Ensured that SAP Best Practices were followed for the implementation
Confidential
Senior SAP Security and Integration Architect
Responsibilities:
- Created Project Plans for implementation of new functionality to implement PTC (Positive Traction Control)
- Designed and implemented user profiles and authorizations for ECC systems using activity groups and roles, functional areas including Financial Accouting, Budget, Funds Management, Asset Management
- Implemented authorizations using principle of least privilege
- Carried out security configuration activities for upgrade of SAP ECC systems using the security transaction su25 and completed the steps
- Designed and implemented user profiles and authorizations for Solution Manager to configure access for ChaRM, documentation, monitoring
- Carried out security configuration for upgrade of SAP Solution Manager systems to 7.2 using su25
- Designed and implemented user profiles and authorizations for SAP Enterprise Portal
- Designed the authorization checks for limiting access to sensitive data. This was done by monitoring assignment of transactions to users that allowed access to sensitive data such as personal details of employees and personnel, salary information, medical records and other data deemed to be of sensitive nature or protected by privacy laws.
- The usage of such transactions by users was monitored by use of the security audit log and recorded for auditing purposes.
- Designed and configured roles and profiles to comply with Segregation of Duties policies. This was done by identification of transaction groups and accesses that would come under the SOD guidelines. The assignment of such transactions was monitored by regular reporting of assignments to users.
- Configured the Change Request Management (ChaRM) functionality on the Solution Manager system.
- Used ChaRM for management and promotion of changes in the SAP systems, including ECC, Enterprise Portal, BW and Business Objects changes.
- Created deployment plans, integration and testing plans acceptance plans for the project
- As SAP Integration Architect, implemented new SAP ECC landscape for CN to implement the PTC (Positive Traction Control) control.
- Determined the requirements for access strategies for the new ECC landscape including roles, authorizations, security policies
- Identified access requirements for different categories of users in the new CN landscape and the user access required as per CN guidelines.
- Applied Segregation of Duties principles to roles and authorization profiles in accordance with policies and guidelines.
- Analyzing and implemented business requirements and integration requirements between SAP systems, existing SAP landscapes and external Corporate systems
- Guided the project team to follow SAP Best Practices
- Implemented newer SAP technologies such as CCDB and CCTS to bring about process efficiencies
Confidential
Senior SAP Security and Audit Consultant
Responsibilities:
- The CBS landscape comprised the GRC, ECC, BW and CRM systems.
- For the CBS landscape, gathered the requirement for SAP authorizations from business users
- Designed and built the roles and authorizations for the SAP landscape in compliance with CBS security policies and regulations.
- Carried out testing of the authorization profiles using acceptance criteria and user validation testing.
- As SAP Security and Audit Administrator, responsible for assigning authorizations to business users
- Applied Segregation of Duties principles to roles and authorization profiles in accordance with policies and guidelines.
- Organised audits and analyzed audit reports to ensure that the SoD matrix was adhered to in the design and distribution of roles and authorization profiles to users.
- Identified and applied business rules within GRC in order to ensure compliance with security policies and guidelines.
- Created Business roles and Technical roles in GRC to be applied on the connected satellite systems.
- Configured the functionality in GRC to analyze access levels in the satellite systems
- Provided Firefighter functionality to satellite systems using GRC
- Administered security and audit on ECC Ehp7, BW, CRM
- Analyzing and implementing security policies and audit policies including SoD, business guidelines and best practices
- Analysis of audit logs for sensitive transactions and data access
- Business Role / Technical Role development and administration
Confidential
Senior SAP Security Audit Architect
Responsibilities:
- Worked as the SAP Security Architect on large scale SAP Productions systems with 2000+ concurrent users and 30000+ named users. Employment and Social Development Canada (ESDC) is a large department of the Government of Canada with branches and offices throughout the country.
- Designed and implemented user profiles and authorizations for ECC systems using activity groups and roles, functional areas including Financial Accouting, Budget, Funds Management, Asset Management
- Implemented authorizations using principle of least privilege
- Used GRC Access Control for implementing Segregation of Duties (SOD) policies
- Carried out security configuration activities for upgrade of SAP ECC systems using the security transaction su25 and completed the steps
- Designed and implemented user profiles and authorizations for Solution Manager to configure access for ChaRM, documentation, monitoring
- Carried out security configuration for upgrade of SAP Solution Manager systems to 7.1 using su25
- Designed and implemented user profiles and authorizations for SAP Enterprise Portal
- Designed the authorization checks for limiting access to sensitive data. This was done by monitoring assignment of transactions to users that allowed access to sensitive data such as personal details of employees and personnel, salary information, medical records and other data deemed to be of sensitive nature or protected by privacy laws.
- The usage of such transactions by users was monitored by use of the security audit log and recorded for auditing purposes.
- Designed and configured roles and profiles to comply with Segregation of Duties policies. This was done by identification of transaction groups and accesses that would come under the SOD guidelines. The assignment of such transactions was monitored by regular reporting of assignments to users.
- Configured the Change Request Management (ChaRM) functionality on the Solution Manager system.
- Used ChaRM for management and promotion of changes in the SAP systems, including ECC, Enterprise Portal, BW and Business Objects changes.
- Architected, designed and implemented the ECC system landscape
- Architected, designed and implemented the BW system landscape
- Architected, designed and implemented the Enterprise Portal system landscape
- Architected, designed and implemented the Business Objects system landscape
- Architected, designed and implemented the GRC system landscape
- Architected, designed and implemented the Identity Management system landscape
- Implemented the migration of the ECC and BW systems to the HANA db platform
- Implemented ESDC systems on the HANA Enterprise Cloud (HEC)
- Architected, designed and implemented Roles and Authorizations for the ECC systems
- Architected, designed and implemented Roles and Authorizations for the BW systems
- Architected, designed and implemented Roles and Authorizations for the SAP Enterprise Portal systems
- Implemented security policies and access for the SAP Business Objects landscape
- Configured connectivity between the BW and Business Objects Systems
- Carried out import of roles from the backend BW systems on the Business Objects systems
- Used inheritance of authorizations to implement security on the Business Objects systems
- Created users on the SAP Business Objects systems using different authentication methods including Enterprise authentication and SAP authentication
- Provided security on SAP Business Objects including folder level security for sensitive reports
- Configure access levels for Business Objects users as per security guidelines
- Used IdM for user identification and provisioning of roles and authorizations
- Integrated IdM with Active Directory for authentication
- Configured connectivity between IdM and GRC to identify risk during provisioning users
- Applied Segregation of Duties principles to roles and authorization profiles in accordance with policies and guidelines.
- Organised audits and analyzed audit reports to ensure that the SoD matrix was adhered to in the design and distribution of roles and authorization profiles to users.
- Identified and applied business rules within GRC in order to ensure compliance with security policies and guidelines.
- Created Business roles and Technical roles in GRC to be applied on the connected satellite systems.
- Configured the functionality in GRC to analyze access levels in the satellite systems
- Provided Firefighter functionality to satellite systems using GRC
Confidential
Senior SAP Technical/Security Architect
Responsibilities:
- As Technical/Security Architect, was responsible for deliverables including: security configuration for the analysis planning and upgrade of ECC from version SAP R3 4.6C to ECC 6.0
- Implemented security policies and access for the SAP Business Objects landscape
- As a SAP Application/ Software Architect & Analyst, was responsible for deliverables including: analysis planning and upgrade of ECC from version SAP R3 4.6C to ECC 6.0
- Analyzed, architected and implemented Unicode Conversion as part of the upgrade
- Implemented Distribution Monitor for improvement of performance during the Unicode Conversion
- Worked as the SAP Solutions Architect on large scale SAP Productions systems with 2000+ concurrent users. Confidential is a multi-national company with users in North America, South America and Europe
- Analyzed and tuned system parameters for optimization of the upgraded system
- Configured connectivity between the BW and Business Objects Systems
- Carried out import of roles from the backend BW systems on the Business Objects systems
- Used inheritance of authorizations to implement security on the Business Objects systems
- Created users on the SAP Business Objects systems using different authentication methods including Enterprise authentication and SAP authentication
- Provided security on SAP Business Objects including folder level security for sensitive reports
- Configure access levels for Business Objects users as per security guidelines
- Analyzed and tuned system parameters for optimization of the upgraded system
Confidential
Senior SAP Technical/Security Architect
Responsibilities:
- Analyzed, architected and implemented solutions for ECC, BI, PI, Solution Manager, e-Recruiting, SCM APO, LiveCache and other SAP systems to fulfill business requirements
- Worked as the SAP Basis Architect on large scale SAP Productions systems with 900+ concurrent users. Confidential is a large company with SAP Production systems that are utilized by users from Canada, the US, international offices, manufacturing facilities and branches
- Designed and implemented user profiles and authorizations for ECC systems using activity groups and roles, functional areas including Financial Accouting, Budget, Funds Management, Asset Management
- Implemented authorizations using principle of least privilege
- Carried out security configuration activities for upgrade of SAP ECC systems using the security transaction su25 and completed the steps
- Designed and implemented user profiles and authorizations for Solution Manager to configure access for ChaRM, documentation, monitoring
- Carried out security configuration for upgrade of SAP Solution Manager systems to 7.1 using su25
- Designed and implemented user profiles and authorizations for SAP Enterprise Portal
- Designed the authorization checks for limiting access to sensitive data. This was done by monitoring assignment of transactions to users that allowed access to sensitive data such as personal details of employees and personnel, salary information, medical records and other data deemed to be of sensitive nature or protected by privacy laws.
- The usage of such transactions by users was monitored by use of the security audit log and recorded for auditing purposes.
- Designed and configured roles and profiles to comply with Segregation of Duties policies. This was done by identification of transaction groups and accesses that would come under the SOD guidelines. The assignment of such transactions was monitored by regular reporting of assignments to users.
- Configured the Change Request Management (ChaRM) functionality on the Solution Manager system.
- Used ChaRM for management and promotion of changes in the SAP systems, including ECC, Enterprise Portal, BW and Business Objects changes.
- Analyzed, designed and architected a new e-Recruiting SAP technical landscape for the Client for its e-Recruiting landscape that included the Sandbox, Dev, QA and Prod systems, on HP-UX and Oracle. The implementation project was required in order to instate a SAP recruiting functionality (this SAP system did not previously exist and replaced an in-house application)
- The new landscape of e-Recruiting was implemented to in corporate the recruiting function in SAP, and also to leverage the tools provided by SAP e-Recruiting. Prior to implementing the SAP e-Recruiting landscape, the recruiting was done using in-house software that utilized spreadsheets and text files
- As the SAP Basis Architect, analyzed, designed, sized, created the project plan, architected SAP technical infrastructure requirements, and created detailed architecture design documents for each server in the e-Recruiting landscape, including software design plans for file systems, network connections, storage requirements (including mirroring, backup and recovery plans), an archiving strategy, defining disaster recovery plans and procedures, monitoring requirements, testing, hardware requirements, and sign-off requirements
- Developed plans for the upgrade methodology, backup requirement and functional testing
- Analyzed and configured the System Landscape Directory (SLD) to ensure that the latest system information was recorded. The configuration was carried out by setting the connections between the SLD and the SAP systems. The information collected by the SLD was then transferred to the Solution Manager by scheduling batch jobs that run at periodic intervals
- Installed and configured SLD jobs to transfer system information to the Solution Manager environment
- Installed and configured the new landscapes on the Solution Manager environment, for monitoring, support package download, change request management and early watch reporting
- Determined the requirements for the RIM landscape comprising SAP ECC, SAP BW, Business Objects, SAP Solution Manager and other supporting landscapes. This included the requirements for access strategies including roles, authorizations, security policies
- Designed and implemented roles and authorization profiles in the RIM landscapes for the different categories of users, which included users in Business Objects, BW among others
- Carried out import of roles from the backend BW systems on the Business Objects systems
- Used inheritance of authorizations to implement security on the Business Objects systems
- Created users on the SAP Business Objects systems using different authentication methods including Enterprise authentication and SAP authentication
- Provided security on SAP Business Objects including folder level security for sensitive reports
- Configure access levels for Business Objects users as per security guidelines
- Configured batch jobs on CPS from Dev, QA and Production systems
Confidential
Senior SAP Security Architect
Responsibilities:
- Analyzed, architected and implemented security for Business Objects 3.1 on Windows and SQL Server
- Configured the CCM
- Implemented security policies and access for the SAP Business Objects landscape
- Configured connectivity between the BW and Business Objects Systems
- Carried out import of roles from the backend BW systems on the Business Objects systems
- Used inheritance of authorizations to implement security on the Business Objects systems
- Created users on the SAP Business Objects systems using different authentication methods including Enterprise authentication and SAP authentication
- Provided security on SAP Business Objects including folder level security for sensitive reports
- Configure access levels for Business Objects users as per security guidelines
- Set up interfaces for Business Objects with SAP BI
- Installed report servers
Confidential
SAP Security Architect & Analyst
Responsibilities:
- Developed the design for the SAP landscape to be used for ECC 6.0, BI and Business Objects Reporting
- Installed SAP BW and Business Objects and configured the security in terms of Roles and Authorization profiles
- Implemented security policies and access for the SAP Business Objects landscape
- Configured connectivity between the BW and Business Objects Systems
- Carried out import of roles from the backend BW systems on the Business Objects systems
- Used inheritance of authorizations to implement security on the Business Objects systems
- Created users on the SAP Business Objects systems using different authentication methods including Enterprise authentication and SAP authentication
- Provided security on SAP Business Objects including folder level security for sensitive reports
- Configure access levels for Business Objects users as per security guidelines
Confidential
Senior SAP Security Architect & Analyst
Responsibilities:
- Analyzed, designed, configured and administered a Single Sign On between SAP systems, and between SAP and non-SAP systems
- Implemented security policies and access for the SAP Business Objects landscape
- Designed and implemented user profiles and authorizations for ECC systems using activity groups and roles, functional areas including Financial Accouting, Budget, Funds Management, Asset Management
- Implemented authorizations using principle of least privilege
- Carried out security configuration activities for upgrade of SAP ECC systems using the security transaction su25 and completed the steps
- Designed and implemented user profiles and authorizations for Solution Manager to configure access for ChaRM, documentation, monitoring
- Carried out security configuration for upgrade of SAP Solution Manager systems using su25
- Designed and implemented user profiles and authorizations for SAP Enterprise Portal
- Designed the authorization checks for limiting access to sensitive data. This was done by monitoring assignment of transactions to users that allowed access to sensitive data such as personal details of employees and personnel, salary information, medical records and other data deemed to be of sensitive nature or protected by privacy laws.
- The usage of such transactions by users was monitored by use of the security audit log and recorded for auditing purposes.
- Designed and configured roles and profiles to comply with Segregation of Duties policies. This was done by identification of transaction groups and accesses that would come under the SOD guidelines. The assignment of such transactions was monitored by regular reporting of assignments to users.
- Configured the Change Request Management (ChaRM) functionality on the Solution Manager system.
- Used ChaRM for management and promotion of changes in the SAP systems, including ECC, Enterprise Portal, BW and Business Objects changes.
- Configured connectivity between the BW and Business Objects Systems
- Carried out import of roles from the backend BW systems on the Business Objects systems
- Used inheritance of authorizations to implement security on the Business Objects systems
- Created users on the SAP Business Objects systems using different authentication methods including Enterprise authentication and SAP authentication
- Provided security on SAP Business Objects including folder level security for sensitive reports
- Configure access levels for Business Objects users as per security guidelines
- Ensured that SAP systems were in compliance with security policies and guidelines. Took action as necessary to correct policy violations.
Confidential
Senior SAP Security Architect & Analyst
Responsibilities:
- Analysed requirements, designed, configured and implemented SAP security for BI, CRM and Enterprise Portal, for the implementation of the roll-out
- Worked on security solutions for the SAP CRM and ECC landscapes, for a global roll-out across North America, UK, Europe and the Middle East
- Designed and implemented user profiles and authorizations for ECC systems using activity groups and roles, functional areas including Financial Accouting, Budget, Funds Management, Asset Management
- Implemented authorizations using principle of least privilege
- Carried out security configuration activities for upgrade of SAP ECC systems using the security transaction su25 and completed the steps
- Designed and implemented user profiles and authorizations for Solution Manager to configure access for ChaRM, documentation, monitoring
- Carried out security configuration for upgrade of SAP Solution Manager systems using su25
- Designed and implemented user profiles and authorizations for SAP Enterprise Portal
- Designed the authorization checks for limiting access to sensitive data. This was done by monitoring assignment of transactions to users that allowed access to sensitive data such as personal details of employees and personnel, salary information, medical records and other data deemed to be of sensitive nature or protected by privacy laws.
- The usage of such transactions by users was monitored by use of the security audit log and recorded for auditing purposes.
- Designed and configured roles and profiles to comply with Segregation of Duties policies. This was done by identification of transaction groups and accesses that would come under the SOD guidelines. The assignment of such transactions was monitored by regular reporting of assignments to users.
- Configured the Change Request Management (ChaRM) functionality on the Solution Manager system.
- Used ChaRM for management and promotion of changes in the SAP systems, including ECC, Enterprise Portal, BW and Business Objects changes.
- Analyzed, designed and configured a Single Sign-On feature, and integrated it with Active Directory
- Analyzed, designed and architected a new SAP BW technical Portal landscape that included Dev, QA and Prod systems, on Windows and SQL Server. The BW Portal was required to enable viewing of BW reports. The BW portal was implemented and integrated transparently into the Enterprise Portal. This SAP landscape system did not previously exist at the Client-site
- Analyzed, sized, defined and architected the SAP technical infrastructure requirements and created detailed design documents for each server in the new BW Portal landscape that included software plans, file systems, network connections, storage requirements (including mirroring, backup and recovery plans), an archiving strategy, disaster recovery plans and procedures, monitoring requirements, hardware requirements, testing and sign-off
- Analyzed, architected and developed solutions that allowed SAP to integrate with other systems and tools, such as the integration of in-house legacy system Customer data from branches into the SAP CRM system, for the data to be loaded into the SAP BW for report generation
- Created the interfaces between SAP and mobile applications, used by Client branches
- Worked on the BW Portal landscape for production usage
- Used the SAP Process Integrator (PI) for interfacing with non-SAP systems. The sales agents in the fields used hand-held devices to record business dealings. This data was interfaced with SAP using the incoming message functionality in the PI system
- Implemented and executed SQL scripts, sqlplus, to manage, update and configure the databases of the SAP systems
- Implemented Adobe document services for printing of documents in the SAP landscape
- Implemented Tomcat for enabling the installation and implementation of SAP systems such as Business Objects Reporting and Business Objects Data Services
- Implemented Java for installation and implementation of SAP NW application software
- Worked on solutions for the SAP CRM and ECC landscapes, for a global roll-out across North America, UK, Europe and the Middle East
- Promoted transports using CTS in a 3-system landscape comprising the Development, Quality and Production systems.
- Monitored the security implementation in the post go-live phase
Confidential
Senior SAP Technical/Security Architect & Analyst
Responsibilities:
- As a SAP Basis Application/ Software Architect & Analyst, was responsible for deliverables including: landscape design, server architecture, network connections, interfaces between systems, storage configuration, mirroring consistency, back-up, restore and storage, disaster and recovery, database configuration, OS configuration, GUI configuration, web interfacing, performance monitoring and tuning, error analysis and resolution, and maintenance and upgrade requirements
- Analyzed, designed and installed application servers for production systems
- Analyzed the performance of the ECC and BI 7 landscapes
- Implemented the Change Transport System (CTS) for moving the changes / transports in the landscape
- Implemented a 3-system landscape for development, testing and implementation of changes
- The transports were moved from Development to the Quality Assurance system for testing and validation using Production-like data in the QA system. System and integration testing was conducted in the QA system and sign-off was obtained before approval for transport to Production
- Analyzed the security configuration of the Business Objects, ECC and BI landscapes
- Implemented security policies and access for the SAP Business Objects landscape
- Configured connectivity between the BW and Business Objects Systems
- Carried out import of roles from the backend BW systems on the Business Objects systems
- Used inheritance of authorizations to implement security on the Business Objects systems
- Created users on the SAP Business Objects systems using different authentication methods including Enterprise authentication and SAP authentication
- Provided security on SAP Business Objects including folder level security for sensitive reports
- Configure access levels for Business Objects users as per security guidelines
Confidential
Senior SAP Security Technical Architect & Analyst
Responsibilities:
- Implemented security policies and access for the SAP Business Objects landscape
- Configured connectivity between the BW and Business Objects Systems
- Carried out import of roles from the backend BW systems on the Business Objects systems
- Used inheritance of authorizations to implement security on the Business Objects systems
- Created users on the SAP Business Objects systems using different authentication methods including Enterprise authentication and SAP authentication
- Provided security on SAP Business Objects including folder level security for sensitive reports
- Configure access levels for Business Objects users as per security guidelines
- Analyzed audit report and took steps necessary to corrected any defects identified
Confidential
Senior SAP Security Technical Application Architect & Analyst
Responsibilities:
- As a SAP Security Application/ Software Architect & Analyst, was responsible for deliverables including: roles and authorization profiles, landscape design, server architecture, network connections, interfaces between systems, storage configuration, mirroring consistency, back-up, restore and storage, disaster and recovery, database configuration, OS configuration, GUI configuration, web interfacing, performance monitoring and tuning, error analysis and resolution, and maintenance and upgrade requirements
- Worked as the SAP Solutions Architect on large scale SAP Production systems that had 900+ concurrent users. Confidential is an internationally known and large apparel and footwear company. SAP is used enterprise-wide to conduct business operations, and is accessed by users throughout the company
- Analyzed, designed, architected, installed and configured a new Solution Manager SAP technical landscape and environment that included the Dev, QA and Prod systems, on UNIX and Informix. The new Solution Manager landscape implementation was required to provide an interface for EarlyWatch reporting for the SAP landscape; a SAP solution which previously did not exist
- Implemented security for the Solution Manager landscape for production usage after verification and testing by the technical and functional teams
- Planned and executed the upgrade of the BW 3.5 System to BI 7, to leverage new functionality for reporting and OLAP analysis
- Analyzed, architected and developed solutions that allow SAP to integrate with other systems and tools, such as the extraction of in-house legacy system HR and Sales data into SAP, to be loaded into BW to enable the generation of OLAP reports
- Monitored performance
- Used the SAP Process Integrator (PI) for interfacing with non-SAP systems. PI was interfaced with external Point of Sale (POS) systems used at retail outlets. Since Confidential products are sold at retail outlets that use different POS systems, SAP PI was used for importing data from the POS systems, to be integrated and imported to the ECC System (using messaging interfaces)
- Designed the backup and retrieval strategy for database and archive logs
- Verified the integrity of backups and log archiving using test systems
- Provided security and user profiles for users on BI and Portal
Confidential
Senior SAP Application/ Software Architect & Analyst
Responsibilities:
- As a SAP Application/ Software Architect & Analyst, was responsible for deliverables including: landscape design, server architecture, network connections, interfaces between systems, storage configuration, mirroring consistency, back-up, restore and storage, disaster and recovery, database configuration, OS configuration, GUI configuration, web interfacing, performance monitoring and tuning, error analysis and resolution, and maintenance and upgrade requirements
- Analyzed, designed and architected a new BW 3.1 SAP technical landscape that included the Sandbox, Dev, QA and Prod systems, on Windows and SQL Server. This SAP landscape did not exist before. The company decided to implement the BI landscape, to leverage the reporting capability available with BI
- Analyzed, sized, defined and architected the SAP technical infrastructure requirements and created the detailed design documents for each server in the new BW 3.1 landscape that included software plans, file systems, network connections, storage requirements (including mirroring, backup and recovery plans), archiving strategy, disaster recovery plans and procedures, monitoring requirements, testing, hardware and sign-off requirements
- Implemented the BW 3.1 landscape for production usage after verification of the environment, by the functional team and the technical team
- Created detailed operations’ procedures
- Analyzed, architected, implemented, installed and configured SAP solutions, including those for the ECC, BI and Solution Manager environments, in a homogeneous Windows operating environment, for the ECC and BI business transaction processing and reporting, and Solution Manager interfacing to SAP (to carry out EarlyWatch reporting on the SAP systems)
- Monitored systems for performance
- Created strategic plans for SAP implementation
- Created tactical plans for specific projects and implementations
- Developed blueprints
- Designed training workshops for various categories of users
- Created unit testing, system testing, regression plans and strategies
- Validated analysis to ensure the compliance with regulatory standards and requirements
Confidential
Senior SAP Application/ Software Architect & Analyst
Responsibilities:
- As a SAP Application/ Software Architect & Analyst, was responsible for deliverables including: landscape design, server architecture, network connections, interfaces between systems, storage configuration, mirroring consistency, back-up, restore and storage, disaster and recovery, database configuration, OS configuration, GUI configuration, web interfacing, performance monitoring and tuning, error analysis and resolution, and maintenance and upgrade requirements
- Designed the architecture for an upgrade from 3.1H to 4.6
- Worked on an upgrade of BW from 2.0B to 2.1C
- Upgraded from R/3 3.1H to 4.6C
- Provided post upgrade support
- Decommissioned various obsolete SAP systems
- Consulted on R/3 security and the control of user access
- Designed a R/3 security access for various teams and roles, using Profile Generator
- Communicated with the Client on various activities to be carried out, and requirements, benefits and any ramifications of introducing features
- Provided Transport Management System (TMS) design and configuration
Confidential
Senior SAP Security Architect & Analyst
Responsibilities:
- Designed, built and tested roles and authorization profiles for the systems in the SAP lanscape
- Worked on a HR Implementation including installation, security, kernel upgrade, application of LCPs and user training for R/3 Version 4.6C
- Worked on a mySAP.com implementation and upgrade
- Assigned authorization profiles to users based on security policies and requirements
- Communicated and consulted with the Client
- Implemented SAP R/3 4.6C and applied Support Packages to leverage new functionality offered by SAP
- Designed and implemented SAP R/3 security with special emphasis on Finance and HR
- Implemented mySAP.com workplace 2.0 with plug-in and roles, and upgraded to 2.1. implemented security for the new sytems
Confidential
SAP Basis Application/ Software Architect & Analyst
Responsibilities:
- As a SAP Basis Application/ Software Architect & Analyst, was responsible for deliverables including: landscape design, server architecture, network connections, interfaces between systems, storage configuration, mirroring consistency, back-up, restore and storage, disaster and recovery, database configuration, OS configuration, GUI configuration, web interfacing, performance monitoring and tuning, error analysis and resolution, and maintenance and upgrade requirements
- Implemented and supported eTurbo, a SAP-based e-commerce solution that has pre-defined configuration (which lessens the time for implementation)
- Implemented an Internet Transaction Server (ITS) and HTML SAPGUI
- Implemented SAP R/3 ver. 4.0B, 4.5B
Confidential
Senior SAP Basis Application/ Software Architect & Analyst
Responsibilities:
- As a SAP Basis Application/ Software Architect & Analyst, was responsible for deliverables including: landscape design, server architecture, network connections, interfaces between systems, storage configuration, mirroring consistency, back-up, restore and storage, disaster and recovery, database configuration, OS configuration, GUI configuration, performance monitoring and tuning, error analysis and resolution, and maintenance and upgrade requirements
- Analyzed, architected and implemented SAP R/3 versions 3.x/4.x
- Upgraded system to SAP R/3 4.6A, along with a database migration
- Worked on a security implementation
- Interacted with the team and users to define roles and architecture, for role-based security
- Worked with management to identify the data requiring high security
- Coordinated the design and implementation of security, and end-to-end testing
- Worked on the application structure for patches for SAP kernels, Oracle DB and Support packages for 4.6A
Confidential
Senior Basis Application/ Software Architect & Analyst
Responsibilities:
- As a SAP Basis Application/ Software Architect & Analyst, was responsible for deliverables including: landscape design, server architecture, network connections, interfaces between systems, storage configuration, mirroring consistency, back-up, restore and storage, disaster and recovery, database configuration, OS configuration, GUI configuration, performance monitoring and tuning, error analysis and resolution, and maintenance and upgrade requirements
- Analyzed, architected and implemented SAP R/3 security, using Profile Generator
- Designed activity groups to implement security for various regions and roles, within the organization
- Archived SAP documents using SAP archiving tools
- Worked on Workbench Organizer and Customizing Organizer (CTS) operations
- Provided virtual memory management, and expansion of database on new devices
Confidential
Senior SAP Basis Application/ Software Architect & Analyst
Responsibilities:
- As a SAP Basis Application/ Software Architect & Analyst, was responsible for deliverables including: landscape design, server architecture, network connections, interfaces between systems, storage configuration, mirroring consistency, back-up, restore and storage, disaster and recovery, database configuration, OS configuration, GUI configuration, performance monitoring and tuning, error analysis and resolution, and maintenance and upgrade requirements
- Coordinated with users, team members and client management, to analyze and architect plans for implementation and upgrade projects
- Coordinated training activities to help users become familiar with the software application as quickly as possible
- Traveled to Asia to supervise the rollout of SAP in that region
- Upgraded from R/3 ver. 3.0D to 3.1H
- Provided user maintenance plans (create users, delete users, allocate profiles)
- Provided client maintenance plans (client creation, client copies, client deletes)
- Worked on R/3 security and user access plans, using authorizations and profiles
Confidential
Senior SAP Basis Application/ Software Architect & Analyst
Responsibilities:
- As a SAP Basis Application/ Software Architect & Analyst, was responsible for deliverables including: landscape design, server architecture, network connections, interfaces between systems, storage configuration, mirroring consistency, back-up, restore and storage, disaster and recovery, database configuration, OS configuration, GUI configuration, performance monitoring and tuning, error analysis and resolution, and maintenance and upgrade requirements
- Analyzed, architected and implemented R/3 ver 3.x
- Provided user maintenance plans (to create users, delete users, allocate profiles)
- Provided client maintenance plans (for client creation, client copies, client deletes)
- Designed and implemented SAP security using authorization objects and profiles
- Provided plans for Workbench Organizer and Customizing Organizer (CTS) operations
- Provided Tablespace management plans
- Provided ALE setup and testing plans
Confidential
SAP Basis Application/ Software Architect & Analyst
Responsibilities:
- As a SAP Basis Application/ Software Architect & Analyst, was responsible for deliverables including: landscape design, server architecture, network connections, interfaces between systems, storage configuration, mirroring consistency, back-up, restore and storage, disaster and recovery, database configuration, OS configuration, GUI configuration, performance monitoring and tuning, error analysis and resolution, and maintenance and upgrade requirements
- Worked as a SAP Basis Application/ Software Architect & Analyst on a large scale SAP Production system of 500+ concurrent users. Providing the analysis, architecture and development for ABAP/4 programs, which were implemented for added functionality within the Financial and Sales & Distribution modules
- Worked with Basis and Abap/4 areas
- Provided training to users and interacted with management to ensure the successful implementation of the SAP system
- Worked on Correction and Transport System plans
- Worked on Database monitoring plans
- Created and modified user tables
- Architected and developed programs for generating reports (including interactive reports)
- Provided performance analysis
- Provided Batch Data Communication (BDC) plans for the transfer of data from other systems, into SAP
- Involved in the design and configuration of the Materials Management module